Journal of Computer Security

Impact Factor
2023
1.2
CiteScore
2023
2.1

Volume

31, 6 issues

Latest issue

32:2 online 09 April 2024

Next issue

32:3 scheduled for June 2024

Back volumes

From volume 1, 1992

ISSN print

0926-227X

ISSN online

1875-8924

Aims & Scope

The Journal of Computer Security presents research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems. It also provides a forum for ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community.

The journal provides an opportunity to publish articles of greater depth and length than is possible in the proceedings of various existing conferences, while addressing an audience of researchers in computer security who can be assumed to have a more specialized background than the readership of other archival publications. The journal welcomes contributions on all aspects of computer security: confidentiality, integrity, and assurance of service - that is, protection against unauthorized disclosure or modification of sensitive information, or denial of service. Of interest is a precise understanding of security policies through modelling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware systems implementing them.

Editorial Board

Editors-in-Chief

Dr. Stéphanie Delaune
Univ Rennes, CNRS, IRISA
Campus universitaire de Beaulieu
263 Avenue du Général Leclerc
35042 Rennes Cedex - France
E-mail: stephanie.delaune@irisa.fr

Dr. Peng Liu
College of Information Sciences and Technology
Pennsylvania State University

330 Westgate, University Park
PA 16802, USA
E-mail: pliu@ist.psu.edu

Founding Editors

Prof. Sushil Jajodia
Center for Secure Information Systems
George Mason University

USA

Dr. Jonathan Millen
MITRE Cooperation
USA

Associate Editors

Musard Balliu
School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology Stockholm
Sweden

Ioana Boureanu
Surrey Centre for Cyber Security, University of Surrey
UK

Kevin Butler
University of Florida
USA

Stefano Calzavara
Università Ca' Foscari Venezia
Italy

Sabrina De Capitani di Vimercati
Univ. degli Studi di Milano
Italy

Mauro Conti
University of Padova
Italy

Daniel Gruss
Graz University
Austria

Yufei Han
National Institute for Research in Computer Science and Control, CIDRE Team Le Chesnay
France

Limin Jia
CMU
USA

Jingqiang Lin
University of Science and Technology of China
China

Vincent Nicomette
INSA Toulouse - LAAS-CNRS
France

Gabriele Oligeri
Hamad bin Khalifa University
Qatar

Kui Ren
Zhejiang University
China

Peter Schwabe
Max Planck Institute for Security and Privacy
Germany

R. Sekar
Stony Brook Univ.
USA

Jaideep Vaidya
Rutgers Univ.
USA

Haining Wang
University of Delaware
USA

Ting Wang
Pennsylvania State University
USA

Qiang Zeng
George Mason University
Fairfax, USA

Author Guidelines

SUBMISSION OF MANUSCRIPTS

By submitting my article to this journal, I agree to the Author Copyright Agreement, the IOS Press Ethics Policy, and the IOS Press Privacy Policy.

Authors are requested to submit their manuscript electronically to the journal’s editorial management system in the form of a PDF file.
Authors are encouraged to use the JCS LaTeX style file to follow the formatting rules explained in more detail below.

Submitted manuscripts must represent original material, and no version of the submission can be simultaneously submitted to any conference, journal, or any other publication.  The journal encourages submissions which have not been previously published.  JCS also publishes papers that are significant extensions of outstanding papers published elsewhere (see Prior Publication Policy).

The journal discourages the submission of excessively long papers (longer than 45 pages in JCS format, including figures and references, but excluding appendices), and unnecessary digressions even in shorter papers. The restrictions is to motivate authors to bring out the essence of their papers more clearly, to make it easier for the reviewers and readers. Typical expected length is around 30 pages. Material above 45 pages should be included as an appendix.

Publication Fee
The Journal of Computer Security does not charge a publication fee.

Authorship
Any author included in the author list should have contributed significantly to the paper, and no person who has made a significant contribution should be omitted from the list of authors. Please read the IOS Press authorship policy for further information.

Formatting Rules
Manuscripts must be written in English. Authors whose native language is not English are advised to consult a professional English language editing service or a native English speaker prior to submission.

Submitted manuscripts must be formatted to print on either A4 or US Letter sized paper.  Regardless of the size of the paper, the text block must fit within a centered rectangle 15.1cm wide and 19.5cm tall. All content, including figures, tables, and footnotes, must fit within this text block. Text should be printed in a single column using at least an 11 point Roman font on at least 12.375 point leading. We have made available an IOS LaTeX style file that will format text according to these requirements.

Every page of the manuscript should be numbered. No reference should be made in the text to page numbers.

Symbols and labels used in plots and figures should be easily readable and interpretable when printed; they should not rely on on-screen magnification to be intelligible. Please also avoid the excessive use of italics and bold face.

Prior Publication Policy
Submissions that are extensions of one or more papers (by one or more of the authors) previously appeared elsewhere must have a major value-added extension over what appeared previously. In particular, a submission based on previous publications should have at least 25% new material. This new material should be significant new content: it cannot be simply some rewriting, trivial proofs, or performance figures that offer no new insight. Previous publications should be explicitly referenced in the submission and the added value over them explicitly discussed in the manuscript.

The authors should prepare a single PDF file collating:
- A cover letter detailing the novel added value with respect to previous publications;
- The manuscript under submission;
- Previous papers of which the manuscript being submitted is an extension.

Such PDF file should then be uploaded on Editorial Manager.

Special Issue Proposals
Journal of Computer Security only accepts a few Special Issues per year. When submitting a Special Issue proposal, it is recommended that they are associated with well-known international conferences such as ESORICS, DBSEC, CSF, SCN, etc. Special Issue proposals pertaining to individual article topics or themes will not be considered.

PREPARATION OF MANUSCRIPTS ONCE ACCEPTED

Required files
For initial submission a .pdf file of the article is sufficient. After an article has been accepted for publication an editable file of the text, such as MsWord or LateX, is required. If you are uploading a paper that has been accepted for publication or accepted pending minor revisions please upload the source files of the paper. If using LaTeX please use our LaTeX template and also send a pdf version of the LaTeX file as well as separate files of all figures (if any); see "Preparation of manuscripts" for the required file formats. LaTeX packages should be compiled into .zip or .rar files.

Colour figures
It is possible to have figures printed in colour, provided the cost of their reproduction is paid for by the author. See Preparation of Manuscripts for the required file formats.

Open Access option
The IOS Press Open Library offers authors an Open Access (OA) option. By selecting the OA option, the article will be freely available from the moment it is published, also in the pre-press module. In the Open Library the article processing charges are paid in the form of an Open Access Fee. Authors will receive an Open Access Order Form upon acceptance of their article. Open Access is entirely optional.
See also our website for more information about this option IOS Press Open Library.

Copyright of your article
Authors submitting a manuscript do so on the understanding that they have read and agreed to the terms of the IOS Press Author Copyright Agreement.

Article sharing
Authors of journal articles are permitted to self-archive and share their work through institutional repositories, personal websites, and preprint servers. Authors have the right to use excerpts of their article in other works written by the authors themselves, provided that the original work is properly cited. The consent for sharing an article, in whole or in part, depends on the version of the article that is shared, where it is shared, and the copyright license under which the article is published. Please refer to the IOS Press Article Sharing Policy for further information.

Quoting from other publications
Authors, when quoting from someone else's work or when considering reproducing figures or tables from a book or journal article, should make sure that they are not infringing a copyright. Although in general authors may quote from other published works, permission should be obtained from the holder of the copyright if there will be substantial extracts or reproduction of tables, plates, or other figures. If the copyright holder is not the author of the quoted or reproduced material, it is recommended that the permission of the author should also be sought. Material in unpublished letters and manuscripts is also protected and must not be published unless permission has been obtained. Submission of a paper will be interpreted as a statement that the author has obtained all the necessary permission. A suitable acknowledgement of any borrowed material must always be made.

PROOFS AND PRE-PRESS

The corresponding author will receive a PDF proof and is asked to check this proof carefully (the publisher will execute a cursory check only). Corrections other than printer's errors, however, should be avoided. Costs arising from such corrections will be charged to the authors.

The corrected proof is published online in the journal’s pre-press module. This is not the final version. When the article is published in an issue, the final published version replaces the pre-press file. Pre-press articles are fully citable by using their DOI number.

PURCHASES

How to order reprints, a PDF file, journals, or IOS Press books
The corresponding author of a contribution to the journal will receive a complimentary PDF Author’s Copy of the article, unless otherwise stated. This PDF copy is watermarked and for personal use only. A free PDF copy will not be provided for conference proceedings and abstract issues. An order form for a PDF file without watermark, reprints or additional journal copies will be provided along with the PDF proof.

If you wish to order reprints of an earlier published article, please contact the publisher for a quotation. IOS Press, Fax: +31 20 687 0019. Email: editorial@iospress.nl.

An author is entitled to 25 % discount on IOS Press books. See Author's discount (25%) on all IOS Press book publications.

KUDOS
Authors of published articles (non-prepress, final articles) will be contacted by Kudos. Kudos is a service that helps researchers maximize the impact and visibility of their research. It allows authors to enrich their articles with lay metadata, add links to related materials and promote their articles through the Kudos system to a wider public. Authors will receive no more than three emails: one invitation and a maximum of two reminders to register for the service and link the published article to their profile. Using and registering for Kudos remains entirely optional. For more information, please have a look at our authors section.

HOW TO PROMOTE YOUR WORK

Would you like some pointers on how to help your research achieve a wider reach and greater impact? Please consult our Promotional Toolkit for Authors for tips.

Please visit the IOS Press Authors page for further information.

Abstracted/Indexed in

Academic Search
ACM Computing Reviews
ACM Digital Library
Applied Science & Technology Source
Business Source Complete
Cabell's Guide or Directory
Cambridge Scientific Abstracts
Compendex
Computer Abstracts
Computer Science Index
CSA Illumina
DBLP Bibliography Server
EBSCO Databases
Emerald Management Reviews
Inspec IET
International Security & Counter-Terrorism Reference Center
MasterFILE
Microsoft Academic Search
Science & Technology Collection
SciVerse Scopus
Ulrich's Periodicals Directory
Web of Science: BIOSIS Previews
Web of Science: Emerging Sources Citation Index

Open Access

By default, articles published in the Journal of Computer Security are available only to institutions and individuals with access rights. However, the journal offers all authors the option to purchase open access publication for their article as part of the IOS Press Open Library. This means that the final published version will be freely available to anyone worldwide, indefinitely, under a Creative Commons license and without the need to purchase access to the article. This is also referred to as “gold” open access.

Gold open access pricing
Authors who choose gold open access publication will be subject to an article publication charge of € 1500 / US$ 1500 for publication under the CC BY-NC 4.0 license or € 2150 / US$ 2150 for publication under the CC BY 4.0 license. Pricing is exclusive of possible taxes. After an article is accepted for publication, the corresponding author will be informed regarding the open access option during the production stages, and will have the opportunity to purchase open access for their article. It could be that the open access fee of an article is waived completely due an institutional agreement IOS Press has with the corresponding authors' institution. Please check the institutional agreements page for details.

Green open access
Authors who do not make use of the gold open access option may still make their article freely available using self-archiving, also referred to as green open access. Authors may make their final accepted manuscript available for free download from their personal or institutional website or institutional archive. This model is free for the author.

Peer Review

Journal of Computer Security is a peer-reviewed journal. All articles submitted to the journal undergo a single blind peer review process. This means that the identity of the authors is known with the reviewers but the identity of the reviewers is not communicated to the authors. Please visit our reviewer guidelines for further information about how to conduct a review.

All submitted manuscripts are automatically screened for plagiarism through iThenticate. Each submitted article is pre-screened by the Editors-in-Chief to decide if it is suitable to be sent out for formal review. Reasons to reject a paper in the pre-screening process could for example be because the work does not fall within the aims and scope, the writing is of poor quality, the instructions to authors were not followed or the presented work is not novel.

Papers deemed suitable to be reviewed will be assigned a handling editor. The handling editor will then invite reviewers to comment on the work. Typically, a minimum of two reviews are required to be able make a decision on a paper.

Reviewers are asked to judge a paper on at least:

  • Relevance to the journal
  • Significance of results
  • Depth of results
  • Correctness of results
  • Clarity of presentation

Based on the received reviews the handling editor will propose to the Editors-in-Chief their recommendation:

  • Accept as is
  • Accept Pending Minor Revisions
  • Revise and Resubmit
  • Reject Outright

For articles that receive a Revise and Resubmit decision, often major revisions are required and articles may still be rejected in a second round of peer review.

Accept or reject decisions are made by the Editors-in-Chief, whose decision is final.

The editors will do their best to provide feedback within a maximum of three months after submission. When the paper submitted is of high quality it will be sent to several external reviewers and it may take longer before a decision is reached. Questions on the status of the submission will be considered by the editorial office if the paper has been submitted more than three months ago.

Extra

Newsletter: Be sure to sign up to the JCS newsletter to receive alerts of new issues and other journal news. Sign up via this link: tiny.cc/JCSsignup.

Latest Newsletter: You can view the latest newsletter here

Latest Articles

Discover the contents of the latest journal issue:

A certificateless signcryption with proxy-encryption for securing agricultural data in the cloud
Abigail Akosua Addobea, Isaac Amankona Obiri, Eric Affum, Jacob Ankamah, Albert Kofi Kwansah Ansah

StegEraser: Defending cybersecurity against malicious covert communications
Wensheng Zhang, Jianfeng Zhang, Jingdong Xu

Sequence-based malware detection using a single-bidirectional graph embedding and multi-task learning framework
Zhewngyu Zhang, Jiale Luo, Jiesi Luo, Pin Yang, Runyu Jing

Cache attacks on subkey calculation of Blowfish
Wenhao Wang, Haopeng Fan, Yongjuan Wang, Xiangbin Wang, Yang Gao

Sustainable Development Goals

The content of this journal relates to SDG:

sdg symbolsdg symbolsdg symbolsdg symbolsdg symbol

Visit the SDG page for more information.

Supporting Diversity and Inclusion

 This journal supports IOS Press' actions relating to the Sustainable Development Goals (SDGs) and commits to the Diversity and Inclusion Statement.

dark blue banner for JCS author geo data for SDGs

More information will be available in due course. Check the SDGs page for updates.